Vendor SOC 1, 2 or 3 – Understanding the Differences

Vendor SOC 1, 2 or 3 – Understanding the Differences

Your vendors pose different types of risks to your business and organization. Make sure they comply with industry standards. Deal with a SOC-compliant vendor if you use its services for critical projects. The three...
Chrome Zero-Day Flaw Actively Exploited in the Wild – Google Emergency Update!!

Chrome Zero-Day Bug Actively Exploited in the Wild – Google Emergency Update!!

The Chrome web browser for desktops recently received an emergency security update to address a zero-day vulnerability that has been found to be actively exploited in the wild. As part of this emergency security update,...
Compromised Data of Over 9 Million Health Insurance Users Is Being Exposed On the Dark Web

Compromised Data of Over 9 Million Health Insurance Users Is Being Exposed On the...

After hitting Australian telecommunications company Optus, in which the information of over 9 million users has been exposed, cybercriminals have victimized another company —  Medibank, one of the largest Australian insurance companies. Following the data...
Easy Way to Fix Windows Security Not Opening in Windows

Easy Way to Fix Windows Security Not Opening in Windows

Windows Security Center is one of the most popular and trusted products from Microsoft. This product allows you to protect your PC from malware and other threats. However, some users may experience some performance...
Chinese Hackers Abuse Google Drive to Drop Malware on Govt Networks

Chinese Hackers Abuse Google Drive to Drop Malware on Govt Networks

Government, research, and academic institutions worldwide were targeted by a spearphishing campaign by state-funded Chinese hackers. As part of this campaign, hackers deliver custom malware that remains hidden in Google Drive. Researchers attribute the attacks...
Hackers Behind Hive Ransomware

Hackers Behind Hive Ransomware Earned $100 Million from 1,300 Victims

The FBI recently asserted that there have been thousands of companies have been targeted by the notorious Hive ransomware gang since June 2021.  During that time frame, the operators of the Hive ransomware gang extorted...
U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Cyber security infrastructure and security Agency uncovered a potential cyber attack on the U.S Federal network where attackers compromised the organization’s DC and possibly deployed crypto Miner, credential Harvester. Iranian APT hackers launched an...
Retesting: A Re-Pentesting Towards More Secure Products For Red & Blue Teamers

Retesting: A Re-Pentesting Towards More Secure Products For Red & Blue Teamers

Let’s examine how rigorous retesting of products during a pentest engagement can make products more secure and what goes into performing efficient retesting. Introduction: Why Retesting? First of all, let’s clarify what retesting is. Basically, it’s...
How To Detect A Keylogger On Your Computer? Find & Remove Keylogger From PC

How To Detect A Keylogger On Your Computer? Find & Remove Keylogger From PC

People who use a PC always fear that someone might be looking at all their activities for stealing thier password, reading their messages and more. But these are not just false fears it is...
Microsoft Security Update Patches 6 Actively Exploited Zero-days Including 62 News Bugs

Microsoft Security Update Patches 6 Actively Exploited Zero-day Including 62 New Bugs

Microsoft released a security update under the November Patch Tuesday with the fixes of 68 security vulnerabilities including 6 actively exploited zero-days that affect several Microsoft products. In this list of Vulnerabilities, 12 Vulnerabilities...
Website